Summer Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > CompTIA > A+ > 220-1102

220-1102 CompTIA A+ Certification Core 2 Exam Question and Answers

Question # 4

A technician needs to access a Windows 10 desktop on the network in a SOHO using RDP. Although the connection is unsuccessful, the technician is able to ping the computer successfully. Which of the following is MOST likely preventing the connection?

A.

The Windows 10 desktop has Windows 10 Home installed.

B.

The Windows 10 desktop does not have DHCP configured.

C.

The Windows 10 desktop is connected via Wi-Fi.

D.

The Windows 10 desktop is hibernating.

Full Access
Question # 5

A user notices a small USB drive is attached to the user's computer after a new vendor visited the office. The technician notices two files named grabber.exe and output.txt. Which of the following attacks is MOST likely occurring?

A.

Trojan

B.

Rootkit

C.

Cryptominer

D.

Keylogger

Full Access
Question # 6

A technician receives a call from a user who is unable to open Outlook. The user states that Outlook worked fine yesterday, but the computer may have restarted sometime overnight. Which of the following is the MOST likely reason Outlook has stopped functioning?

A.

Spam filter installation

B.

Invalid registry settings

C.

Malware infection

D.

Operating system update

Full Access
Question # 7

The screen on a user's mobile device is not autorotating even after the feature has been enabled and the device has been restarted. Which of the following should the technician do next to troubleshoot the issue?

A.

Calibrate the phone sensors.

B.

Enable the touch screen.

C.

Reinstall the operating system.

D.

Replace the screen.

Full Access
Question # 8

A user installed a new computer game. Upon starting the game, the user notices the frame rates are low. Which of the following should the user upgrade to resolve the issue?

A.

Hard drive

B.

Graphics card

C.

Random-access memory

D.

Monitor

Full Access
Question # 9

Which of the following Is used to identify potential issues with a proposed change poor lo implementation?

A.

Request form

B.

Rollback plan

C.

End-user acceptance

D.

Sandbox testing

Full Access
Question # 10

A technician is creating a tunnel that hides IP addresses and secures all network traffic. Which of the following protocols is capable of enduring enhanced security?

A.

DNS

B.

IPS

C.

VPN

D.

SSH

Full Access
Question # 11

A user visits a game vendor's website to view the latest patch notes, but this information is not available on the page. Which of the following should the user perform before reloading the page?

A.

Synchronize the browser data.

B.

Enable private browsing mode.

C.

Mark the site as trusted.

D.

Clear the cached file.

Full Access
Question # 12

A company recently experienced a security incident in which a USB drive containing malicious software was able to covertly install malware on a workstation. Which of the following actions should be taken to prevent this incident from happening again? (Select two).

A.

Install a host-based IDS.

B.

Restrict log-in times.

C.

Enable a BIOS password.

D.

Update the password complexity.

E.

Disable AutoRun.

F.

Update the antivirus definitions.

G.

Restrict user permissions.

Full Access
Question # 13

Which of the following is the proper way for a technician to dispose of used printer consumables?

A.

Proceed with the custom manufacturer's procedure.

B.

Proceed with the disposal of consumables in standard trash receptacles.

C.

Empty any residual ink or toner from consumables before disposing of them in a standard recycling bin.

D.

Proceed with the disposal of consumables in standard recycling bins.

Full Access
Question # 14

A user notices a small USB drive is attached to the user's computer after a new vendor visited the office. The technician notices two files named grabber.exe and output.txt. Which of the following attacks is MOST likely occurring?

A.

Trojan

B.

Rootkit

C.

Cryptominer

D.

Keylogger

Full Access
Question # 15

Which of the following would most likely be used in a small office environment?

A.

Print server

B.

Virtualization

C.

Domain access

D.

Workgroup

Full Access
Question # 16

A department manager submits a help desk ticket to request the migration of a printer's port utilization from USB to Ethernet so multiple users can access the printer. This will be a new network printer; thus a new IP address allocation is required. Which of the following should happen immediately before network use is authorized?

A.

Document the date and time of the change.

B.

Submit a change request form.

C.

Determine the risk level of this change.

D.

Request an unused IP address.

Full Access
Question # 17

A macOS user is installing a new application. Which of the following system directories is the software MOST likely to install by default?

A.

/etc/services

B.

/Applications

C.

/usr/bin

D.

C:\Program Files

Full Access
Question # 18

A user updates a mobile device's OS.A frequently used application becomes consistently unresponsive immediately after the device is launched. Which of the following troubleshooting steps should the user perform FIRST?

A.

Delete the application's cache.

B.

Check for application updates.

C.

Roll back the OS update.

D.

Uninstall and reinstall the application.

Full Access
Question # 19

A technician is troubleshooting an issue with a computer that contains sensitive information. The technician determines the computer needs to be taken off site for repair. Which of the following should the technician do NEXT?

A.

Remove the HDD and then send the computer for repair.

B.

Check corporate polices for guidance.

C.

Delete the sensitive information before the computer leaves the building.

D.

Get authorization from the manager.

Full Access
Question # 20

A technician needs to remotely connect to a Linux desktop to assist a user with troubleshooting. The technician needs to make use of a tool natively designed for Linux. Which of the following tools will the technician MOST likely use?

A.

VNC

B.

MFA

C.

MSRA

D.

RDP

Full Access
Question # 21

A large company is selecting a new Windows operating system and needs to ensure it has built-in encryption and endpoint protection. Which of the following Windows versions will MOST likely be selected?

A.

Home

B.

Pro

C.

Pro for Workstations

D.

Enterprise

Full Access
Question # 22

A remote user is experiencing issues with Outlook settings and asks a technician to review the settings. Which of the following can the technician use to access the user's computer remotely?

A.

VPN

B.

RDP

C.

RMM

D.

SSH

Full Access
Question # 23

Which of The following refers to the steps to be taken if an Issue occurs during a change Implementation?

A.

Testing

B.

Rollback

C.

Risk

D.

Acceptance

Full Access
Question # 24

A technician installs specialized software on a workstation. The technician then attempts to run the software. The workstation displays a message indicating the software is not authorized to run. Which of the following should the technician do to most likely resolve the issue?

A.

Install the software in safe mode.

B.

Attach the external hardware token.

C.

Install OS updates.

D.

Restart the workstation after installation.

Full Access
Question # 25

A user connected an external hard drive but is unable to see it as a destination to save files. Which of the following tools will allow the drive to be formatted?

A.

Disk Management

B.

Device Manager

C.

Disk Cleanup

D.

Disk Defragmenter

Full Access
Question # 26

Which of the following common security vulnerabilities can be mitigated by using input validation?

A.

Brute-force attack

B.

Cross-site scripting

C.

SQL injection

D.

Cross-site request forgery

Full Access
Question # 27

A user requires local administrative access to a workstation. Which of the following Control Panel utilities allows the technician to grant access to the user?

A.

System

B.

Network and Sharing Center

C.

User Accounts

D.

Security and Maintenance

Full Access
Question # 28

A user has been unable to receive emails or browse the internet from a smartphone while traveling. However, text messages and phone calls are working without issue. Which of the following should a support technician check FIRST?

A.

User account status

B.

Mobile OS version

C.

Data plan coverage

D.

Network traffic outages

Full Access
Question # 29

A technician needs to transfer a file to a user's workstation. Which of the following would BEST accomplish this task utilizing the workstation's built-in protocols?

A.

VPN

B.

SMB

C.

RMM

D.

MSRA

Full Access
Question # 30

A desktop technician has received reports that a user's PC is slow to load programs and saved files. The technician investigates and discovers an older HDD with adequate free space. Which of the following should the technician use to alleviate the issue first?

A.

Disk Management

B.

Disk Defragment

C.

Disk Cleanup

D.

Device Manager

Full Access
Question # 31

During an enterprise rollout of a new application, a technician needs to validate compliance with an application's EULA while also reducing the number of licenses to manage. Which of the following licenses would best accomplish this goal?

A.

Personal use license

B.

Corporate use license

C.

Open-source license

D.

Non-expiring license

Full Access
Question # 32

A technician is unable to access the internet or named network resources. The technician receives a valid IP address from the DHCP server and can ping the default gateway. Which of the following should the technician check next to resolve the issue?

A.

Verify the DNS server settings.

B.

Turn off the Windows firewall.

C.

Confirm the subnet mask is correct.

D.

Configure a static IP address.

Full Access
Question # 33

A technician is installing RAM in a new workstation and needs to protect against electrostatic discharge. Which of the following will best resolve this concern?

A.

Battery backup

B.

Thermal paste

C.

ESD strap

D.

Consistent power

Full Access
Question # 34

A technician is setting up a newly built computer. Which of the following is the fastest way for the technician to install Windows 10?

A.

Factory reset

B.

System Restore

C.

In-place upgrade

D.

Unattended installation

Full Access
Question # 35

A systems administrator is configuring centralized desktop management for computers on a domain. The management team has decided that all users' workstations should have the same network drives, printers, and configurations. Which of the following should the administrator use to accomplish this task?

A.

Network and Sharing Center

B.

net use

C.

User Accounts

D.

regedit

E.

Group Policy

Full Access
Question # 36

A systems administrator notices that a server on the company network has extremely high CPU utilization. Upon further inspection, the administrator sees that the server Is consistently communicating with an IP address that is traced back to a company that awards digital currency for solving hash algorithms. Which of the following was MOST likely used to compromise the server?

A.

Keylogger

B.

Ransomware

C.

Boot sector virus

D.

Cryptomining malware

Full Access
Question # 37

The courts determined that a cybercrimes case could no longer be prosecuted due to the agency's handling of evidence.Which of the following was MOST likelyviolated during the investigation?

A.

Open-source software

B.

EULA

C.

Chain of custody

D.

AUP

Full Access
Question # 38

A user contacts the help desk to request assistance with a program feature. The user is in a different building but on the same network as the help desk technician. Which of the following should the technician use to assist the user?

A.

AAA

B.

SSH

C.

RDP

D.

VPN

Full Access
Question # 39

A user reports that the pages flash on the screen two or three times before finally staying open when attempting to access banking web pages. Which of the following troubleshooting steps should the technician perform NEXT to resolve the issue?

A.

Examine the antivirus logs.

B.

Verify the address bar URL.

C.

Test the internet connection speed.

D.

Check the web service status.

Full Access
Question # 40

A technician is troubleshooting application crashes on a Windows workstation. Each time the workstation user tries to open a website in a browser, the following message is displayed:

crypt32.d11 is missing not found

Which of the following should the technician attempt FIRST?

A.

Rebuild Windows profiles.

B.

Reimage the workstation

C.

Roll back updates

D.

Perform a system file check

Full Access
Question # 41

A technician is preparing to remediate a Trojan virus that was found on a workstation. Which of the following steps should the technician complete BEFORE removing the virus?

A.

Disable System Restore.

B.

Schedule a malware scan.

C.

Educate the end user.

D.

Run Windows Update.

Full Access
Question # 42

A technician is setting up a newly built computer. Which of the following is the fastest way for the technician to install Windows 10?

A.

Factory reset

B.

System Restore

C.

In-place upgrade

D.

Unattended installation

Full Access
Question # 43

A user updates a mobile device's OS. A frequently used application becomes consistently unresponsive immediately after the device is launched. Which of the following troubleshooting steps should the user perform FIRST?

A.

Delete the application's cache.

B.

Check for application updates.

C.

Roll back the OS update.

D.

Uninstall and reinstall the application.

Full Access
Question # 44

A company acquired a local office, and a technician is attempting to join the machines at the office to the local domain. The technician notes that the domain join option appears to be missing. Which of the following editions of Windows is MOST likely installed on the machines?

A.

Windows Professional

B.

Windows Education

C.

Windows Enterprise

D.

Windows Home

Full Access
Question # 45

A company uses shared drives as part of a workforce collaboration process. To ensure the correct access permissions, inheritance at the top-level folder is assigned to each department. A manager's team is working on confidential material and wants to ensure only the immediate team can view a specific folder and its subsequent files and subfolders. Which of the following actions should the technician most likely take?

A.

Turn off inheritance on the requested folder only and set the requested permissions to each file manually.

B.

Turn off inheritance at the top-level folder and remove all inherited permissions.

C.

Turn off inheritance at the top-level folder and set permissions to each file and subfolder manually.

D.

Turn off inheritance on the requested folder only, set the requested permissions, and then turn on inheritance under the child folders.

Full Access
Question # 46

A kiosk, which is running Microsoft Windows 10, relies exclusively on a numeric keypad to allow customers to enter their ticket numbers but no other information. If the kiosk is idle for four hours, the login screen locks. Which of the following sign-on options would allow any employee the ability to unlock the kiosk?

A.

Requiring employees to enter their usernames and passwords

B.

Setting up facial recognition for each employee

C.

Using a PIN and providing it to employees

D.

Requiring employees to use their fingerprints

Full Access
Question # 47

Which of the following editions of Windows 10 requires reactivation every 180 days?

A.

Enterprise

B.

Pro for Workstation

C.

Home

D.

Pro

Full Access
Question # 48

A customer calls a service support center and begins yelling at a technician about a feature for a product that is not working to the customer's satisfaction. This feature is not supported by the service support center and requires a field technician to troubleshoot. The customer continues to demand service. Which of the following is the BEST course of action for the support center representative to take?

A.

Inform the customer that the issue is not within the scope of this department.

B.

Apologize to the customer and escalate the issue to a manager.

C.

Ask the customer to explain the issue and then try to fix it independently.

D.

Respond that the issue is something the customer should be able to fix.

Full Access
Question # 49

A systems administrator is creating a new document with a list of the websites that users are allowed to access. Which of the following types of documents is the administrator MOST likely creating?

A.

Access control list

B.

Acceptable use policy

C.

Incident report

D.

Standard operating procedure

Full Access
Question # 50

A company implemented a BYOD policy and would like to reduce data disclosure caused by malware that may infect these devices. Which of the following should the company deploy to address these concerns?

A.

UAC

B.

MDM

C.

LDAP

D.

SSO

Full Access
Question # 51

An IT security team is implementing a new Group Policy that will return a computer to the login after three minutes. Which of the following BEST describes the change in policy?

A.

Login times

B.

Screen lock

C.

User permission

D.

Login lockout attempts

Full Access
Question # 52

A technician installed Windows 10 on a workstation. The workstation only has 3.5GB of usable RAM, even though the technician installed 8GB. Which of the following is the MOST likely reason this system is not utilizing all the available RAM?

A.

The system is missing updates.

B.

The system is utilizing a 32-bit OS.

C.

The system's memory is failing.

D.

The system requires BIOS updates

Full Access
Question # 53

A company is retiring old workstations and needs a certificate of destruction for all hard drives. Which of the following would be BEST to perform on the hard drives to ensure the data is unrecoverable? (Select TWO).

A.

Standard formatting

B.

Drilling

C.

Erasing

D.

Recycling

E.

Incinerating

F.

Low-level formatting

Full Access
Question # 54

A technician is troubleshooting a PC that has been performing poorly. Looking at the Task Manager, the technician sees that CPU and memory resources seem fine, but disk throughput is at 100%.

Which of the following types of malware is the system MOST likely infected with?

A.

Keylogger

B.

Rootkit

C.

Ransomware

D.

Trojan

Full Access
Question # 55

Which of the following would MOST likely be used to change the security settings on a user's device in a domain environment?

A.

Security groups

B.

Access control list

C.

Group Policy

D.

Login script

Full Access
Question # 56

A user receives an error message on a Windows 10 device when trying to access a mapped drive from a Windows XP machine in the office. Other Windows XP devices in the office can access the drive. Which of the following Control Panel utilities should the user select to enable connectivity to the device?

A.

Devices and Printers

B.

Administrative Tools

C.

Network and Sharing Center

D.

Programs and Features

Full Access
Question # 57

A user's company phone has several pending software updates. A technician completes the following steps:

•Rebooted the phone

•Connected to Wi-Fi

•Disabled metered data

Which of the following should the technician do next?

A.

Restore the factory settings.

B.

Clean the browser history.

C.

Uninstall and reinstall the applications.

D.

Clear the cache.

Full Access
Question # 58

A user’s Windows 10 workstation with an HDD is running really slowly. The user has opened, closed, and saved many large files over the past week. Which of the following tools should a technician use to remediate the issue?

A.

Disk Defragment

B.

Registry Editor

C.

System Information

D.

Disk Cleanup

Full Access
Question # 59

A technician is troubleshooting a Windows 10 PC that has experienced a BSOD. The user recently installed optional Windows updates. Which of the following is best way to resolve the issue?

A.

Enable System Restore.

B.

Roll back the device drivers.

C.

Reinstall the OS.

D.

Update the BIOS.

Full Access
Question # 60

A Windows 10 computer is not installing updates and continues to receive errors even during manual update installations. Which of the following should a technician do to fix the issues? (Select two).

A.

Ensure that the Windows Update Utility is the latest version.

B.

Refresh local WSUS settings on the computer.

C.

Delete the Windows Update cache.

D.

Run the System check to verify system files.

E.

Reimage the operating system while retaining user files.

F.

Reset WMI and re-register system .dlls.

Full Access
Question # 61

Which of the following operating systems uses the ext4 filesystem type?

A.

macOS

B.

iOS

C.

Linux

D.

Windows

Full Access
Question # 62

A user reports receiving constant, unwanted pop-ups and being unable to close the browser window. These issues have impacted the user's productivity and may have caused the user's files to be altered. Which of the following should a technician do to address these issues with minimal impact to the user?

A.

Use System Restore to recover the OS files.

B.

Wipe the computer and install a new copy of the OS.

C.

Identify whether the disk partition table has been reduced in size.

D.

Perform a full-system, antivirus scan and check browser notifications.

Full Access
Question # 63

A technician needs to update the software on several hundred Mac laptops. Which of the following is the best method to complete the task?

A.

SSH

B.

MDM

C.

RDP

D.

SFTP

Full Access
Question # 64

Which of the following language types enables the automation of tasks?

A.

Compiled

B.

Scripting

C.

Web

D.

Database

Full Access
Question # 65

A user clicked a link in an email, and now the cursor is moving around on its own. A technician notices that File Explorer is open and data is being copied from the local drive to an unknown cloud storage location. Which of the following should the technician do first?

A.

Investigate the reported symptoms.

B.

Run anti-malware software.

C.

Educate the user about dangerous links.

D.

Quarantine the workstation.

Full Access
Question # 66

A Windows user wants a filesystem that protects confidential data from attackers who have physical access to the system. Which of the following should the user choose?

A.

ext

B.

APFS

C.

FAT

D.

EFS

Full Access
Question # 67

Which of the following macOS file types requires mounting before installation?

A.

.pkg

B.

.zip

C.

.app

D.

.dmg

Full Access
Question # 68

Which of the following environmental controls is most important to maintain the safety of a data center?

A.

Temperature control

B.

Humidity control

C.

Fire suppression control

D.

Power managementcontrol

Full Access
Question # 69

A technician wants to securely dispose of storage drives. Which of the following is the best way to eliminate data on SSDs?

A.

Degaussing

B.

Shredding

C.

Erasing

D.

Drilling

Full Access
Question # 70

A technician needs to track evidence for a forensic investigation on a Windows computer. Which of the following describes this process?

A.

Valid license

B.

Data retention requirements

C.

Material safety data sheet

D.

Chain of custody

Full Access
Question # 71

A user's antivirus software reports an infection that it is unable to remove. Which of the following is the most appropriate way to remediate the issue?

A.

Disable System Restore.

B.

Utilize a Linux live disc.

C.

Quarantine the infected system.

D.

Update the anti-malware.

Full Access
Question # 72

A technician is troubleshooting a Windows 10 PC that is unable to start the GUI. A new SSD and a new copy of Windows were recently installed on the PC. Which of the following is the most appropriate command to use to fix the issue?

A.

msconfig

B.

chkdsk

C.

sfc

D.

diskpart

E.

mstsc

Full Access
Question # 73

A user clicks a link in an email. A warning message in the user's browser states the site's certificate cannot be verified. Which of the following is the most appropriate action for a technician to take?

A.

Click proceed.

B.

Report the employee to the human resources department for violating company policy.

C.

Restore the computer from the last known backup.

D.

Close the browser window and report the email to IT security.

Full Access
Question # 74

A technician is troubleshooting a PC because the user has reported strange pop-up windows and computer performance issues. Which of the following actions should the technician take next?

A.

Isolate the machine from the network.

B.

Scan the system for hidden files.

C.

Disable unused ports.

D.

Install antivirus software.

E.

Reconfigure the firewall.

Full Access
Question # 75

A computer technician is investigating a computer that is not booting. The user reports that the computer was working prior to shutting it down last night. The technician notices a removable USB device is inserted, and the user explains the device is a prize the user received in the mail yesterday. Which of the following types of attacks does this describe?

A.

Phishing

B.

Dumpster diving

C.

Tailgating

D.

Evil twin

Full Access
Question # 76

A customer called the help desk to report that a machine that was recently updated is no longer working. The support technician checks the latest logs to see what updates were deployed, but nothing was

deployed in more than three weeks. Which of the following should the support technician do to BEST resolve the situation?

A.

Offer to wipe and reset the device for the customer.

B.

Advise that the help desk will investigate and follow up at a later date.

C.

Put the customer on hold and escalate the call to a manager.

D.

Use open-ended questions to further diagnose the issue.

Full Access
Question # 77

Multiple users routinely record log-in information in readily accessible areas. Which of the following is the best way to mitigate this issue?

A.

Trusted sources

B.

Valid certificates

C.

User training

D.

Password manager

Full Access
Question # 78

A customer wants to make sure the data is protected and secure on a Windows laptop's hard drive. Which of the following is the best solution?

A.

Windows Backup

B.

BitLocker

C.

Shadow Copy

D.

Trusted PlatformModule

Full Access
Question # 79

An employee lost a smartphone and reported the loss to the help desk. The employee is concerned about the possibility of a breach of private data. Which of the following is the best way for a technician to protect the data on the phone?

A.

Remote lock

BRemote wipe

B.

Remote access

C.

Remote encrypt

Full Access
Question # 80

A company installed WAPs and deployed new laptops and docking stations to all employees. The docking stations are connected via LAN cables. Users are now reporting degraded network service. The IT department has determined that the WAP mesh network is experiencing a higher than anticipated amount of traffic. Which of the following would be the most efficient way to ensure the wireless network can support the expected number of wireless users?

A.

Replacing non-mobile users' laptops with wired desktop systems

B.

Increasing the wireless network adapter metric

C.

Adding wireless repeaters throughout the building

D.

Upgrading the current mesh network to support the 802.11 n specification

Full Access
Question # 81

A company wants to take advantage of modern technology and transition away from face-to-face meetings. Which of the following types of software would benefit the company the most? (Select two).

A.

Videoconferencing

B.

File transfer

C.

Screen-sharing

D.

Financial

E.

Remote access

F.

Record-keeping

Full Access
Question # 82

A customer service representative is unable to send jobs to a printer at a remote branch office. However, the representative can print successfully to a local network printer. Which of the following commands should a technician use to view the path of the network traffic from the PC?

A.

netstat

B.

ping

C.

format

D.

tracert

Full Access
Question # 83

Multiple users are reporting audio issues as well as performance issues after downloading unauthorized software. You have been dispatched to identify and resolve any issues on the network using best practice procedures.

INSTRUCTIONS

Quarantine and configure the appropriate device(s) so that the users' audio issues are

resolved using best practice procedures.

Multiple devices may be selected for quarantine.

Click on a host or server to configure services.

Full Access
Question # 84

A technician receives a high-priority ticket about sensitive information collected from an end user’s workstation. Which of the following steps should a technician take to preserve the chain of custody for a forensic investigation?

A.

Reimage the workstation.

B.

Inform the user of the investigation.

C.

Recover and secure the workstation.

D.

Back up the workstation

Full Access
Question # 85

A user's workstation was infected with a newly discovered virus that the AV system detected. After a full virus scan and a workstation reboot, the virus is still present in the OS. Which of the following actions should the user take to remove the virus?

A.

Enable the system firewall.

B.

Use bootable antivirus media to scan the system.

C.

Download software designed to specifically target the virus.

D.

Run the operating system update process.

Full Access
Question # 86

A company-owned mobile device is displaying a high number of ads, receiving data-usage limit notifications, and experiencing slow response. After checking the device, a technician notices the device has been jailbroken. Which of the following should the technician do next?

A.

Run an antivirus and enable encryption.

B.

Restore the defaults and reimage the corporate OS.

C.

Back up the files and do a system restore.

D.

Undo the jailbreak and enable an antivirus.

Full Access
Question # 87

Antivirus software indicates that a workstation is infected with ransomware that cannot be quarantined. Which of the following should be performed first to prevent further damage to the host and other systems?

A.

Turn off the machine.

B.

Run a full antivirus scan.

C.

Remove the LAN card.

D.

Install a different endpoint solution.

Full Access
Question # 88

A manager called the help desk to ask for assistance with creating a more secure environment for the finance department- which resides in a non-domain environment. Which of the following would be the BEST method to protect against unauthorized use?

A.

Implementing password expiration

B.

Restricting user permissions

C.

Using screen locks

D.

Disabling unnecessary services

Full Access
Question # 89

A technician needs to reimage a desktop in an area without network access. Which of the following should the technician use? (Select two).

A.

USB

B.

PXE

C.

Optical media

D.

Partition

E.

Boot record

F.

SMB

Full Access
Question # 90

A technician is modifying the default home page of all the workstations in a company. Which of the following will help to implement this change?

A.

Group Policy

B.

Browser extension

C.

System Configuration

D.

Task Scheduler

Full Access
Question # 91

Which of the following file types would be used in the Windows Startup folder to automate copying a personal storage table (.pst file) to a network drive at log-in?

A.

.bat

B.

.dll

C.

.ps1

D.

.txt

Full Access
Question # 92

A technician is creating a location on a Windows workstation for a customer to store meeting minutes. Which of the following commands should the technician use?

A.

c: \minutes

B.

dir

C.

rmdir

D.

md

Full Access
Question # 93

A technician receives an invalid certificate error when visiting a website. Other workstations on the same local network are unable to replicate this issue. Which of the following is most likely causing the issue?

A.

Date and time

B.

User access control

C.

UEFI boot mode

D.

Log-on times

Full Access
Question # 94

A technician successfully removed malicious software from an infected computer after running updates and scheduled scans to mitigate future risks. Which of the following should the technician do next?

A.

Educate the end user on best practices for security.

B.

Quarantine the host in the antivirus system.

C.

Investigate how the system was infected with malware.

D.

Create a system restore point.

Full Access
Question # 95

Which of the following Windows 10 editions is the most appropriate for a single user who wants to encrypt a hard drive with BitLocker?

A.

Professional

B.

Home

C.

Enterprise

D.

Embedded

Full Access
Question # 96

A technician has verified a computer is infected with malware. The technician isolates the system and updates the anti-malware software. Which of the following should the technician do next?

A.

Run one scan and schedule future scans.

B.

Back up the uninfected files and reimage the computer.

C.

Restore the clean backup copies of the infected files.

D.

Run repeated remediation scans until the malware is removed.

Full Access
Question # 97

Which of the following environmental factors are most important to consider when planning the configuration of a data center? (Select two).

A.

Temperature levels

B.

Location of the servers

C.

Humidity levels

D.

Noise levels

E.

Lighting levels

F.

Cable management

Full Access
Question # 98

When a user is in the office, the user's mobile phone loads applications and web browses very slowly on a cellular connection. Which of the following is the best way to fix this issue?

A.

Connect to the company's Wi-Fi network.

B.

Change the settings on the phone to connect to a different cellular tower.

C.

Install a cellular repeater at the office for this user.

D.

Update all applications on the phone.

Full Access
Question # 99

A technician is partitioning a hard disk. The five primary partitions should contain 4TB of free space. Which of the following partition styles should the technician use to partition the device?

A.

EFS

B.

GPT

C.

MBR

D.

FAT32

Full Access
Question # 100

Which of the following combinations meets the requirements for mobile device multifactor authentication?

A.

Password and PIN

B.

Password and swipe

C.

Fingerprint and password

D.

Swipe and PIN

Full Access
Question # 101

A user reports that an air-gapped computer may have been infected with a virus after the user transferred files from a USB drive. The technician runs a computer scan with Windows Defender but does not find an infection. Which of the following actions should the technician take next? (Select two).

A.

Examine the event logs.

B.

Connect to the network.

C.

Document the findings.

D.

Update the definitions.

E.

Reimage the computer.

F.

Enable the firewall.

Full Access
Question # 102

A technician is unable to completely start up a system. The OS freezes when the desktop background appears, and the issue persists when the system is restarted. Which of the following should the technician do next to troubleshoot the issue?

A.

Disable applicable BIOS options.

B.

Load the system in safe mode.

C.

Start up using a flash drive OS and run System Repair.

D.

Enable Secure Boot and reinstall the system.

Full Access
Question # 103

A developer reports that a workstation's database file extensions have been changed from .db to .enc. The developer is also unable to open the database files manually. Which of the following is the best option for recovering the data?

A.

Accessing a restore point

B.

Rebooting into safe mode

C.

Utilizing the backups

D.

Using an AV to scan the affected files

Full Access
Question # 104

A user wants to acquire antivirus software for a SOHO PC. A technician recommends a licensed software product, but the user does not want to pay for a license. Which of the following license types should the technician recommend?

A.

Corporate

B.

Open-source

C.

Personal

D.

Enterprise

Full Access
Question # 105

When trying to access a secure internal network, the user receives an error messaging stating, "There is a problem with this website's security certificate." The user reboots the desktop and tries to access the website again, but the issue persists. Which of the following should the user do to prevent this error from reoccurring?

A.

Reimage the system and install SSL.

B.

Install Trusted Root Certificate.

C.

Select View Certificates and then Install Certificate.

D.

Continue to access the website.

Full Access
Question # 106

A remote user's smartphone is performing very slowly. The user notices that the performance improves slightly after rebooting but then reverts back to performing slowly. The user also notices that the phone does not get any faster after connecting to the company's corporate guest network. A technician sees that the phone has a large number of applications installed on it. Which of the following is the most likely cause of the issue?

A.

The user is in a poor signal area.

B.

The user has too many processes running.

C.

The smartphone has malware on it.

D.

The smartphone has been jailbroken.

Full Access
Question # 107

A user's iPhone was permanently locked after several failed log-in attempts. Which of the following authentication methods are needed to restore access, applications, and data to the device?

A.

Fingerprint and pattern

B.

Facial recognition and PIN code

C.

Primary account and password

D.

Recovery contact and recovery key

Full Access
Question # 108

A customer calls desktop support and begins yelling at a technician. The customer claims to have submitted a support ticket two hours ago and complains that the issue still has not been resolved. Which of the following describes how the technician should respond?

A.

Place the customer on hold until the customer calms down.

B.

Disconnect the call to avoid a confrontation.

C.

Wait until the customer is done speaking and offer assistance.

D.

Escalate the issue to a supervisor.

Full Access
Question # 109

A user recently purchased a second monitor and wants to extend the Windows desktop to the new screen. Which of the following Control Panel options should a technician adjust to help the user?

A.

Color Management

B.

System

C.

Troubleshooting

D.

Device Manager

E.

Administrative Tools

Full Access
Question # 110

An organization is creating guidelines for the incorporation of generative Al solutions. In which of the following would these guidelines be published?

A.

Standard operating procedure

B.

Acceptable use policy

C.

Security protocols

D.

Data flow diagram

Full Access
Question # 111

A user receives a call from someone claiming to be a technical support agent. The caller asks the user to log in to the computer.

Which of the following security measures should the user take to ensure security and privacy?

A.

Only accept calls from known people.

B.

Disregard any suspicious emails.

C.

Update the antivirus software.

D.

Enable two-factor authentication.

E.

Install a malware scanner.

Full Access
Question # 112

As part of a CYOD policy a systems administrator needs to configure each user's Windows device to require a password when resuming from a period of sleep or inactivity. Which of the following paths will lead the administrator to the correct settings?

A.

Use Settings to access Screensaver settings

B.

Use Settings to access Screen Timeout settings

C.

Use Settings to access General

D.

Use Settings to access Display.

Full Access
Question # 113

Which of the following is a proprietary Cisco AAA protocol?

A.

TKIP

B.

AES

C.

RADIUS

D.

TACACS+

Full Access
Question # 114

Which of the following is also known as something you know, something you have, and something you are?

A.

ACL

B.

MFA

C.

SMS

D.

NFC

Full Access
Question # 115

A technician is installing new software on a macOS computer. Which of the following file types will the technician MOST likely use?

A.

.deb

B.

.vbs

C.

.exe

D.

.app

Full Access
Question # 116

Which of the following items require special e-waste recycling? (Select two).

A.

Solid-state drive

B.

A/C adapter

C.

Surge protector

D.

Laptop battery

E.

CRT monitor

F.

Power supply

Full Access
Question # 117

A technician is working with a company to determine the best way to transfer sensitive personal information between offices when conducting business. The company currently uses USB drives and is resistant to change. The company's compliance officer states that all media at rest must be encrypted. Which of the following would be the BEST way to secure the current workflow?

A.

Deploy a secondary hard drive with encryption on the appropriate workstation

B.

Configure a hardened SFTP portal for file transfers between file servers

C.

Require files to be individually password protected with unique passwords

D.

Enable BitLocker To Go with a password that meets corporate requirements

Full Access
Question # 118

A technician is setting up a desktop computer in a small office. The user will need to access files on a drive shared from another desktop on the network. Which of the following configurations should the technician employ to achieve this goal?

A.

Configure the network as private

B.

Enable a proxy server

C.

Grant the network administrator role to the user

D.

Create a shortcut to public documents

Full Access
Question # 119

A systems administrator is setting up a Windows computer for a new user Corporate policy requires a least privilege environment. The user will need to access advanced features and configuration settings for several applications. Which of the following BEST describes the account access level the user will need?

A.

Power user account

B.

Standard account

C.

Guest account

D.

Administrator account

Full Access
Question # 120

A Chief Executive Officer has learned that an exploit has been identified on the web server software, and a patch is not available yet. Which of the following attacks MOST likely occurred?

A.

Brute force

B.

Zero day

C.

Denial of service

D.

On-path

Full Access
Question # 121

A technician is configuring a new Windows laptop Corporate policy requires that mobile devices make use of full disk encryption at all limes Which of the following encryption solutions should the technician choose?

A.

Encrypting File System

B.

FileVault

C.

BitLocker

D.

Encrypted LVM

Full Access
Question # 122

A desktop specialist needs to prepare a laptop running Windows 10 for a newly hired employee. Which of the following methods should the technician use to refresh the laptop?

A.

Internet-based upgrade

B.

Repair installation

C.

Clean install

D.

USB repair

E.

In place upgrade

Full Access
Question # 123

A user reports that a workstation is operating sluggishly Several other users operate on the same workstation and have reported that the workstation is operating normally. The systems administrator has validated that the workstation functions normally. Which of the following steps should the systems administrator most likely attempt NEXT?

A.

Increase the paging file size

B.

Run the chkdsk command

C.

Rebuild the user's profile

D.

Add more system memory.

E.

Defragment the hard drive.

Full Access
Question # 124

A user is experiencing frequent malware symptoms on a Windows workstation. The user has tried several times to roll back the state but the malware persists. Which of the following would MOST likely resolve the issue?

A.

Quarantining system files

B.

Reimaging the workstation

C.

Encrypting the hard drive

D.

Disabling TLS 1.0 support

Full Access
Question # 125

An Android user reports that when attempting to open the company's proprietary mobile application it immediately doses. The user states that the issue persists, even after rebooting the phone. The application contains critical information that cannot be lost. Which of the following steps should a systems administrator attempt FIRST?

A.

Uninstall and reinstall the application

B.

Reset the phone to factory settings

C.

Install an alternative application with similar functionality

D.

Clear the application cache.

Full Access
Question # 126

A user reports a computer is running slow. Which of the following tools will help a technician identity the issued

A.

Disk Cleanup

B.

Group Policy Editor

C.

Disk Management

D.

Resource Monitor

Full Access
Question # 127

A user is unable to log in to the domain with a desktop PC, but a laptop PC is working properly on the same network. A technician logs in lo the desktop PC with a local account but is unable to browse to the secure intranet site to get troubleshooting tools. Which of the following is the MOST likely cause of the issue?

A.

Time drift

B.

Dual in-line memory module failure

C.

Application crash

D.

Filesystem errors

Full Access
Question # 128

Upon downloading a new ISO, an administrator is presented with the following string:

59d15a16ce90cBcc97fa7c211b767aB

Which of the following BEST describes the purpose of this string?

A.

XSS verification

B.

AES-256 verification

C.

Hash verification

D.

Digital signature verification

Full Access
Question # 129

A user calls the help desk to report potential malware on a computer. The anomalous activity began after the user clicked a link to a free gift card in a recent email The technician asks the user to describe any unusual activity, such as slow performance, excessive pop-ups, and browser redirections. Which of the following should the technician do NEXT?

A.

Advise the user to run a complete system scan using the OS anti-malware application

B.

Guide the user to reboot the machine into safe mode and verify whether the anomalous activities are still present

C.

Have the user check for recently installed applications and outline those installed since the link in the email was clicked

D.

Instruct the user to disconnect the Ethernet connection to the corporate network.

Full Access
Question # 130

A user's smartphone data usage is well above average. The user suspects an installed application is transmitting data in the background. The user would like to be alerted when an application attempts to communicate with the internet. Which of the following BEST addresses the user's concern?

A.

Operating system updates

B.

Remote wipe

C.

Antivirus

D.

Firewall

Full Access
Question # 131

An Android user contacts the help desk because a company smartphone failed to complete a tethered OS update A technician determines there are no error messages on the device Which of the following should the technician do NEXT?

A.

Verify all third-party applications are disabled

B.

Determine if the device has adequate storage available.

C.

Check if the battery is sufficiently charged

D.

Confirm a strong internet connection is available using Wi-Fi or cellular data

Full Access
Question # 132

A technician needs to document who had possession of evidence at every step of the process. Which of the following does this process describe?

A.

Rights management

B.

Audit trail

C.

Chain of custody

D.

Data integrity

Full Access
Question # 133

A technician installed a known-good, compatible motherboard on a new laptop. However, the motherboard is not working on the laptop. Which of the following should the technician MOST likely have done to prevent damage?

A.

Removed all jewelry

B.

Completed an inventory of tools before use

C.

Practiced electrical fire safety

D.

Connected a proper ESD strap

Full Access
Question # 134

A technician found that an employee is mining cryptocurrency on a work desktop. The company has decided that this action violates its guidelines. Which of the following should be updated to reflect this new requirement?

A.

MDM

B.

EULA

C.

IRP

D.

AUP

Full Access
Question # 135

Which of the following must be maintained throughout the forensic evidence life cycle when dealing with a piece of evidence?

A.

Acceptable use

B.

Chain of custody

C.

Security policy

D.

Information management

Full Access
Question # 136

A user enabled a mobile device's screen lock function with pattern unlock. The user is concerned someone could access the mobile device by repeatedly attempting random patterns to unlock the device. Which of the following features BEST addresses the user's concern?

A.

Remote wipe

B.

Anti-maIware

C.

Device encryption

D.

Failed login restrictions

Full Access
Question # 137

Which of the following OS types provides a lightweight option for workstations thai need an easy-to-use browser-based interface?

A.

FreeBSD

B.

Chrome OS

C.

macOS

D.

Windows

Full Access
Question # 138

Which of the following is the MOST cost-effective version of Windows 10 that allows remote access through Remote Desktop?

A.

Home

B.

Pro for Workstations

C.

Enterprise

D.

Pro

Full Access
Question # 139

A user needs assistance changing the desktop wallpaper on a Windows 10 computer. Which of the following methods will enable the user to change the wallpaper using a Windows 10 Settings tool?

A.

Open Settings, select Accounts, select, Your info, click Browse, and then locate and open the image the user wants to use as the wallpaper

B.

Open Settings, select Personalization, click Browse, and then locate and open the image the user wants to use as the wallpaper

C.

Open Settings, select System, select Display, click Browse, and then locate and open the image the user wants to use as the wallpaper

D.

Open Settings, select Apps, select Apps & features, click Browse, and then locate and open the image the user wants to use as the wallpaper.

Full Access
Question # 140

A technician needs to interconnect two offices to the main branch while complying with good practices and security standards. Which of the following should the technician implement?

A.

MSRA

B.

VNC

C.

VPN

D.

SSH

Full Access
Question # 141

A web developer installs and launches a new external web server. Immediately following the launch, the performance of all traffic traversing the firewall degrades substantially. Which of the following considerations was overlooked?

A.

OS compatibility

B.

Quality of service

C.

32- vs. 64-bit architecture

D.

Storage requirements

Full Access
Question # 142

A home office user wants to ensure a PC is backed up and protected against local natural disasters and hardware failures. Which of the following would meet the user's requirements?

A.

Using an agent-based cloud backup solution

B.

Implementing a grandfather-father-son backup rotation

C.

Automating backups to a local network share

D.

Saving files manually to an external drive

Full Access
Question # 143

A technician needs to implement a system to handle both authentication and authorization Which of the following meets this requirement?

A.

WPA3

B.

MFA

C.

TACACS+

D.

RADIUS

Full Access
Question # 144

Employees at comptia.org are reporting getting an usual amount of emails from a coworker. A technician discovers the emails were sent from the following address:

john@cOmptia.org

Which of the following social engineering attacks is this an example of?

A.

Whaling

B.

Insider threat

C.

Phishing

D.

Vishing

E.

Evil twin

Full Access
Question # 145

A technician needs to configure security settings on a Windows 10 workstation. Which of the following should the technician configure to limit password attempts?

A.

Account Lockout Policy

B.

User Access Control

C.

System Protection

D.

Firewall

Full Access
Question # 146

Which of the following combinations meets the requirements for mobile device multifactor authentication?

A.

Password and PIN

B.

Password and swipe

C.

Fingerprint and password

D.

Swipe and PIN

Full Access
Question # 147

A technician is troubleshooting a smartphone that is unable to download and install the latest OS update. The technician notices the device operates more slowly than expected, even after rebooting and closing all applications. Which of the following should the technician check next?

A.

Application permissions

B.

Available storage space

C.

Battery charge level

D.

Wi-Fi connection speed

Full Access
Question # 148

A company is Issuing smartphones to employees and needs to ensure data is secure if the devices are lost or stolen. Which of the following provides the BEST solution?

A.

Anti-malware

B.

Remote wipe

C.

Locator applications

D.

Screen lock

Full Access
Question # 149

The command cac cor.ptia. txt was issued on a Linux terminal. Which of the following results should be expected?

A.

The contents of the text comptia.txt will be replaced with a new blank document

B.

The contents of the text comptia. txt would be displayed.

C.

The contents of the text comptia.txt would be categorized in alphabetical order.

D.

The contents of the text comptia. txt would be copied to another comptia. txt file

Full Access
Question # 150

Welcome to your first day as a Fictional Company. LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

Click on individual tickers to see the ticket details. View attachments to determine the problem.

Select the appropriate issue from the 'issue' drop-down menu. Then, select the MOST efficient resolution from the 'Resolution' drop-down menu. Finally, select the proper command or verification to remediate or confirm your fix of the issue from the Verify Resolve drop-down menu.

Full Access
Question # 151

When a user calls in to report an issue, a technician submits a ticket on the user's behalf. Which of the following practices should the technician use to make sure the ticket is associated with the correct user?

A.

Have the user provide a callback phone number to be added to the ticket

B.

Assign the ticket to the department's power user

C.

Register the ticket with a unique user identifier

D.

Provide the user with a unique ticket number that can be referenced on subsequent calls.

Full Access
Question # 152

An organization is centralizing support functions and requires the ability to support a remote user's desktop. Which of the following technologies will allow a technician to see the issue along with the user?

A.

RDP

B.

VNC

C.

SSH

D.

VPN

Full Access
Question # 153

A user connected a laptop to a wireless network and was tricked into providing login credentials for a website. Which of the following threats was used to carry out the attack?

A.

Zero day

B.

Vishing

C.

DDoS

D.

Evil twin

Full Access
Question # 154

A company discovered that numerous computers from multiple geographic locations are sending a very high number of connection requests which is causing the company’s web server to become unavailable to the general public. Which of the following attacks is occurring?

A.

Zero day

B.

SOL injection

C.

Cross-site scripting

D.

Distributed denial of service

Full Access
Question # 155

A technician has been asked to set up a new wireless router with the best possible security. Which of the following should the technician implement?

A.

WPS

B.

TKIP

C.

WPA3

D.

WEP

Full Access
Question # 156

A user is attempting to browse the internet using Internet Explorer. When trying to load a familiar web page, the user is unexpectedly redirected to an unfamiliar website. Which of the following would MOST likely solve the issue?

A.

Updating the operating system

B.

Changing proxy settings

C.

Reinstalling the browser

D.

Enabling port forwarding

Full Access
Question # 157

A user is setting up a computer for the first time and would like to create a secondary login with permissions that are different than the primary login. The secondary login will need to be protected from certain content such as games and websites. Which of the following Windows settings should the user utilize to create the secondary login?

A.

Privacy

B.

Accounts

C.

Personalization

D.

Shared resources

Full Access
Question # 158

A technician receives a call from a user who is on vacation. The user provides the necessary credentials and asks the technician to log in to the

users account and read a critical email that the user has been expecting. The technician refuses because this is a violation of the:

A.

acceptable use policy.

B.

regulatory compliance requirements.

C.

non-disclosure agreement

D.

incident response procedures

Full Access
Question # 159

A user has a license for an application that is in use on a personal home laptop. The user approaches a systems administrator about using the same license on

multiple computers on the corporate network. Which of the following BEST describes what the systems administrator should tell the user?

A.

Use the application only on the home laptop because it contains the initial license.

B.

Use the application at home and contact the vendor regarding a corporate license.

C.

Use the application on any computer since the user has a license.

D.

Use the application only on corporate computers.

Full Access
Question # 160

A user received the following error upon visiting a banking website:

The security presented by website was issued a different website' s address .

A technician should instruct the user to:

A.

clear the browser cache and contact the bank.

B.

close out of the site and contact the bank.

C.

continue to the site and contact the bank.

D.

update the browser and contact the bank.

Full Access
Question # 161

A user calls the help desk and reports a workstation is infected with malicious software. Which of the following tools should the help desk technician use to remove the malicious software? (Select TWO).

A.

File Explorer

B.

User Account Control

C.

Windows Backup and Restore

D.

Windows Firewall

E.

Windows Defender

F.

Network Packet Analyzer

Full Access
Question # 162

Each time a user tries to go to the selected web search provider, a different website opens. Which of the following should the technician check FIRST?

A.

System time

B.

IP address

C.

DNS servers

D.

Windows updates

Full Access
Question # 163

A company is deploying mobile phones on a one-to-one basis, but the IT manager is concerned that users will root/jailbreak their phones. Which of the following technologies can be implemented to prevent this issue?

A.

Signed system images

B.

Antivirus

C.

SSO

D.

MDM

Full Access
Question # 164

A mobile phone user has downloaded a new payment application that allows payments to be made with a mobile device. The user attempts to use the device at a payment terminal but is unable to do so successfully. The user contacts a help desk technician to report the issue. Which of the following should the technician confirm NEXT as part of the troubleshooting process?

A.

If airplane mode is enabled

B.

If Bluetooth is disabled

C.

If NFC is enabled

D.

If WiFi is enabled

E.

If location services are disabled

Full Access
Question # 165

Following a recent power outage, several computers have been receiving errors when booting. The technician suspects file corruption has occurred. Which of the following steps should the technician try FIRST to correct the issue?

A.

Rebuild the Windows profiles.

B.

Restore the computers from backup.

C.

Reimage the computers.

D.

Run the System File Checker.

Full Access
Question # 166

A user reports a workstation has been performing strangely after a suspicious email was opened on it earlier in the week. Which of the following should the technician perform FIRST?

A.

Escalate the ticket to Tier 2.

B.

Run a virus scan.

C.

Utilize a Windows restore point.

D.

Reimage the computer.

Full Access
Question # 167

A user created a file on a shared drive and wants to prevent its data from being accidentally deleted by others. Which of the following applications should the technician use to assist the user with hiding the file?

A.

Device Manager

B.

Indexing Options

C.

File Explorer

D.

Administrative Tools

Full Access
Question # 168

Which of the following is a consequence of end-of-lite operating systems?

A.

Operating systems void the hardware warranty.

B.

Operating systems cease to function.

C.

Operating systems no longer receive updates.

D.

Operating systems are unable to migrate data to the new operating system.

Full Access
Question # 169

A field technician applied a Group Policy setting to all the workstations in the network. This setting forced the workstations to use a specific SNTP server. Users are unable to log in now. Which of the following is the MOST likely cause of this issue?

A.

The SNTP server is offline.

B.

A user changed the time zone on a local machine.

C.

The Group Policy setting has disrupted domain authentication on the system,

D.

The workstations and the authentication server have a system clock difference.

Full Access
Question # 170

A technician has just used an anti-malware removal tool to resolve a user's malware issue on a corporate laptop. Which of the following BEST describes what the technician should do before returning the laptop to the user?

A.

Educate the user on malware removal.

B.

Educate the user on how to reinstall the laptop OS.

C.

Educate the user on how to access recovery mode.

D.

Educate the user on common threats and how to avoid them.

Full Access
Question # 171

After a company installed a new SOHO router customers were unable to access the company-hosted public website. Which of the following will MOST likely allow customers to access the website?

A.

Port forwarding

B.

Firmware updates

C.

IP filtering

D.

Content filtering

Full Access
Question # 172

A user installed a new application that automatically starts each time the user logs in to a Windows 10 system. The user does not want this to happen and has asked for this setting to be changed. Which of the following tools would the technician MOST likely use to safely make this change?

A.

Registry Editor

B.

Task Manager

C.

Event Viewer

D.

Local Users and Groups

Full Access
Question # 173

An analyst needs GUI access to server software running on a macOS server. Which of the following options provides the BEST way for the analyst to access the macOS server from the Windows workstation?

A.

RDP through RD Gateway

B.

Apple Remote Desktop

C.

SSH access with SSH keys

D.

VNC with username and password

Full Access
Question # 174

A small business owner wants to install newly purchased software on all networked PCs. The network is not configured as a domain, and the owner wants to use the easiest method possible. Which of the following is the MOST deficient way lor the owner to install the application?

A.

Use a network share to share the installation files.

B.

Save software to an external hard drive to install.

C.

Create an imaging USB for each PC.

D.

Install the software from the vendor's website

Full Access
Question # 175

Sensitive data was leaked from a user's smartphone. A technician discovered an unapproved application was installed, and the user has full access to the device's command shell. Which of the following is the NEXT step the technician should take to find the cause of the leaked data?

A.

Restore the device to factory settings.

B.

Uninstall the unapproved application.

C.

Disable the ability to install applications from unknown sources.

D.

Ensure the device is connected to the corporate WiFi network.

Full Access
Question # 176

A user is unable to access a website, which is widely used across the organization, and receives the following error message:

The security certificate presented by this website has expired or is not yet valid.

The technician confirms the website works when accessing it from another computer but not from the user's computer. Which of the following should the technician perform NEXT to troubleshoot the issue?

A.

Reboot the computer.

B.

Reinstall the OS.

C.

Configure a static 12

D.

Check the computer's date and time.

Full Access
Question # 177

Which of the following is a data security standard for protecting credit cards?

A.

PHI

B.

NIST

C.

PCI

D.

GDPR

Full Access
Question # 178

A technician connects an additional monitor to a PC using a USB port. The original HDMI monitor is mounted to the left of the new monitor. When moving the mouse to the right from the original monitor to the new monitor, the mouse stops at the end of the screen on the original monitor. Which

of the following will allow the mouse to correctly move to the new monitor?

A.

Rearranging the monitor's position in display settings

B.

Swapping the cables for the monitors

C.

Using the Ctrl+AIt+> to correct the display orientation

D.

Updating the display drivers for the video card

Full Access
Question # 179

A technician has an external SSD. The technician needs to read and write to an external SSD on both Macs and Windows PCs. Which of the following filesystems is supported by both OS types?

A.

NTFS

B.

APFS

C.

ext4

D.

exFAT

Full Access
Question # 180

A systems administrator is tasked with configuring desktop systems to use a new proxy server that the organization has added to provide content filtering. Which of the following Windows utilities IS the BEST choice for accessing the necessary configuration to complete this goal?

A.

Security and Maintenance

B.

Network and Sharing Center

C.

Windows Defender Firewall

D.

Internet Options

Full Access
Question # 181

A team of support agents will be using their workstations to store credit card data. Which of the following should the IT department enable on the workstations in order to remain compliant with common regulatory controls? (Select TWO).

A.

Encryption

B.

Antivirus

C.

AutoRun

D.

Guest accounts

E.

Default passwords

F.

Backups

Full Access
Question # 182

A new service desk is having a difficult time managing the volume of requests. Which of the following is the BEST solution for the department?

A.

Implementing a support portal

B.

Creating a ticketing system

C.

Commissioning an automated callback system

D.

Submitting tickets through email

Full Access
Question # 183

Which of the following is MOST likely contained in an EULA?

A.

Chain of custody

B.

Backup of software code

C.

Personally identifiable information

D.

Restrictions of use

Full Access
Question # 184

A user is having issues with document-processing software on a Windows workstation. Other users that log in to the same device do not have the same issue.

Which of the following should a technician do to remediate the issue?

A.

Roll back the updates.

B.

Increase the page file.

C.

Update the drivers.

D.

Rebuild the profile.

Full Access
Question # 185

While trying to repair a Windows 10 OS, a technician receives a prompt asking for a key. The technician tries the administrator password, but it is rejected. Which of the following does the technician need in order to continue the OS repair?

A.

SSL key

B.

Preshared key

C.

WPA2 key

D.

Recovery key

Full Access
Question # 186

A malicious file was executed automatically when a flash drive was plugged in. Which of the following features would prevent this type of incident?

A.

Disabling UAC

B.

Restricting local administrators

C.

Enabling UPnP

D.

Turning off AutoPlay

Full Access
Question # 187

Windows updates need to be performed on a department's servers. Which of the following methods should be used to connect to the server?

A.

FIP

B.

MSRA

C.

RDP

D.

VPN

Full Access
Question # 188

A technician received a call from a user who clicked on a web advertisement Now. every time the user moves the mouse, a pop-up display across the monitor. Which of the following procedures should the technician perform?

A.

Boot into safe mode.

B.

Perform a malware scan.

C.

Restart the machine.

D.

Reinstall the browser

Full Access
Question # 189

A user called the help desk lo report an Issue with the internet connection speed on a laptop. The technician thinks that background services may be using extra bandwidth. Which of the following tools should the technician use to investigate connections on the laptop?

A.

nslookup

B.

net use

C.

netstat

D.

net user

Full Access
Question # 190

A technician sees a file that is requesting payment to a cryptocurrency address. Which of the following should the technician do first?

A.

Quarantine the computer.

B.

Disable System Restore.

C.

Update the antivirus software definitions.

D.

Boot to safe mode.

Full Access